This Metasploit module exploits a Read Request packet buffer overflow vulnerability.
a286523e4973c08648295a9f06365c71b398d607ccc3a9716e5f04b48fc8c4ff
102 bytes small Linux/x86 sys_execve ["/bin/sh"] setresuid(0,0,0) exit(0) shellcode.
79f5781728e64d7959353df2c015bfe36ef3dc5b859a8118528732c5de92dade
StarDevelop.LiveHelp versions 2.0 and below suffer from a local file inclusion vulnerability.
72ef0e5bedcf1014fa14007e597440a3e89e58ff3753be161571a4b40456a631
WordPress version 3.0.4 suffers from a remote blind SQL injection vulnerability in comment_post_ID.
6a273f61ffcc58a789468c062df0dec4ff7c9739cdde841643ad14910b72ecd2
This Metasploit module exploits a remote buffer overflow in Bison FTP Server version 3.5. It leverages the XMKD, MKD, REST, and ACCL commands to cause a denial of service.
fd0d9f5b757bdeb86dbd65362248c57c98b61dddd1e7dd0d3a0594dc8339ff84
SaurusCMS-CE version 4.7 suffers from remote file inclusion vulnerabilities.
8d0195a9a2c2ad6b058f2974be172b2a666f3904d2d40b9766856a79e152193c
BisonFTP server version 3.5 MKD remote buffer overflow crash exploit.
6157ac1b4d0108188bcfac3f9ccdadb47a302240c656b2fa5c72bfb65f934e09
This Metasploit module exploits a stack buffer overflow in version 1.1 of Free MP3 CD Ripper. By creating a specially crafted .wav file, an attacker may be able to execute arbitrary code.
7401c2dd0f56ba28e5f6c554d7c4eaa36cfe2ff96cdf148453614fed7e3f7b1f
Cerberus FTP Server version 4.0.9.8 REST remote buffer overflow crash exploit.
4ffb43902001c39a48c6ed0bb68c9a86be4f2acf228608af5c8b5dfb4e6c2a2d
This Metasploit module exploits a FreeFloat FTP server buffer overflow found in the MKD/REST/ACCL commands.
539075bf438dbdcd34f52bb8d122261bdbc235dfad1531126246496e4dd6a9bc
KaiBB version 2.0.1 suffers from remote SQL injection and shell upload vulnerabilities.
49b5d8beaf3899efb02a5caed06218c85c1d3d043d51aaa49077b9fb83b54cbb
98 bytes small DragonflyBSD portbinding shellcode that spawns on tcp/31337.
9dd6095b0152bb25cfc0be89391f9e2853e1d558b93b0a02668b5b8705044484
TinyWebGallery version 1.8.4 suffers from remote SQL injection, shell upload, and local file inclusion vulnerabilities.
58acd1a6cc6d2673e32f064c23dbc1e5dca58fd915a19dd864d78f9e1fcd0c89
MiaCMS version 4.9.0 suffers from multiple remote file inclusion vulnerabilities.
23ecd20b38fd8c0fb3fb149910c7e50739d0f05b911e6358be39c1a099f0b031
Zazavi versions 1.2.1 and below suffer from cross site request forgery and shell upload vulnerabilities.
efc0457b3c527d10101324b43740b9416fa5f5c1b0f2473292acd3a5160b1f47
Spider Player version 2.5.3.0 local buffer overflow exploit that creates a malicious .m3u file.
83bb7b17a37703506ea0c49478066bbd90e8a7dee4c76198aa8dc9d55a5740a0
XlightFTP server version 3.7.0 remote root buffer overflow exploit that binds a shell to port 4444.
9d2e8a5927cb8a51a5d283b6999d03be508be925e82cd83e4db0cbde870893d8
Free CD to MP3 Converter version 3.1 universal DEP bypass exploit.
d9b3f2964cd5ec872ea7ba3155899d3cf87c2121259b2180725481e47c36ceed
This Metasploit module exploits a stack buffer overflow in ZipGenius version 6.3.2.3000. It creates a specially crafted .zip file that allows an attacker to execute arbitrary code.
4478ca40041d7cf95b3c3c14d49c5835b6d2c2ed232534c12aa53181799a7142
WebCalendar CVS version 1.2 suffers from multiple cross site request forgery vulnerabilities.
d8cfc989058636dfa0d317c76ea9f02759ab5afb49a5c8c086558e334a3f9220
SeoPanel version 3.0.0-Released suffers from cross site request forgery vulnerabilities.
464551f78c733a2e2751dff93434b7b57eddabf46ba37964516ef1196ee46c9e
SGL.cms version 0.6.0 suffers from a FCKeditor shell upload vulnerability.
b4dd4c275a11fbacbea272a72db6884e2c2ee133983734475d3710c50c8aa79c
I.D. Manager version 6.06 Build 8 remote buffer overflow exploit that leverages downlWithIDM.dll.
b921a47093a2c25825d08f97806b95790aa8ee0121cb97d7e587f6ccaf2a11fa
iMesh versions 10.0 and below remote buffer overflow exploit that leverages IMWebControl.dll.
b530a56a39adab0c7ccef51e41336d51d4fe9c3fd005927036486c4e2a7c6be0
178 bytes small sys_execve ('/bin/sh -c "reboot"') OpenBSD/x86 shellcode.
94d36b3d5311044309d26bc0029d3da5204b148e3ef361130577c6b4cdbffb0a